|
Message-ID: <20150817150442.GA30459@zoho.com>
Date: Mon, 17 Aug 2015 15:04:42 +0000
From: mancha <mancha1@...o.com>
To: oss-security@...ts.openwall.com
Cc: gustavo.grieco@...il.com
Subject: Re: Double free corruption in JasPer JPEG-2000
implementation (CVE-2015-5203)
On Sun, Aug 16, 2015 at 06:48:49PM +0000, mancha wrote:
> On Sun, Aug 16, 2015 at 05:22:50PM +0200, Gustavo Grieco wrote:
> > A new double free affecting JasPer JPEG-2000 (libjasper 1.900) has
> > been found triggered by function jasper_image_stop_load. Despite
> > this library is used by many programs (
> > http://www.ece.uvic.ca/~frodo/jasper/#overview), there is no one
> > providing support, so there is no fix so far.
>
> If you email me your crasher I can look into a fix.
>
> >
> > This vulnerability was found by QuickFuzz.
> >
> > Regards, Gustavo.
>
> --mancha (https://twitter.com/mancha140)
By way of update, Gustavo shared his crasher with me and I've since
provided him with a patch that solves the most immediate cause of the
double free. However, in my review I've found other issues that require
some TLC.
I am waiting to hear back from Gustavo for his feedback.
--mancha
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.